Google is everyone’s best friend (yours or hackers)Information gathering and vulnerability identification are the tasks in the first phase of a typical hacking scenarioPassitive, stealth and huge data collectionGoogle can do more than searchHave you used Google to audit your organization today? Google Hacking Advanced Operators: “Filetype:”Filetype: extension_typeFind documents with specified extensionsThe supported extensions are: